A. I. Antón, J. B. Earp, and A. Reese, Analyzing Website privacy requirements using a privacy goal taxonomy, Proceedings IEEE Joint International Conference on Requirements Engineering, 2002.
DOI : 10.1109/ICRE.2002.1048502

T. Vila, R. Greenstadt, and D. Molnar, Why we can't be bothered to read privacy policies models of privacy economics as a lemons market, Proceedings of the 5th international conference on Electronic commerce , ICEC '03, pp.403-407, 2003.
DOI : 10.1145/948005.948057

W. H. Stufflebeam, A. I. Antón, Q. He, and N. Jain, Specifying privacy policies with P3P and EPAL, Proceedings of the 2004 ACM workshop on Privacy in the electronic society , WPES '04, 2004.
DOI : 10.1145/1029179.1029190

M. Reichenbach, H. Damker, H. Federrath, and K. Rannenberg, Individual Management of Personal Reachability in Mobile Communication, Information Security in Research and Business ; Proceedings of the IFIP TC11 13th international conference on Information Security (SEC'97), pp.164-174, 1997.
DOI : 10.1007/978-0-387-35259-6_14

J. Zibuschka, L. Fritsch, M. Radmacher, T. Scherner, and K. Rannenberg, Privacy- Friendly LBS: A Prototype-supported Case Study, 13th Americas Conference on Information Systems (AMCIS), 2007.

A. Jøsang, L. Fritsch, and T. Mahler, Privacy Policy Referencing," in Trust, Privacy and Security in Digital Business, pp.129-140, 2010.

W. Samuelson and R. Zeckhauser, Status quo bias in decision making, Journal of Risk and Uncertainty, vol.32, issue.1, pp.7-59, 1988.
DOI : 10.1017/CBO9780511809477

URL : http://dtserv2.compsy.uni-jena.de/ss2009/sowpsy_ue/20354393/content.nsf/pages/f0cc3cae039c8b42c125757b00473c77/$file/samuelson_zeckhauser_1988.pdf

R. Münscher, M. Vetter, and T. Scheuerle, A Review and Taxonomy of Choice Architecture Techniques, Journal of Behavioral Decision Making, vol.97, issue.7, pp.511-524, 2016.
DOI : 10.1016/j.obhdp.2005.03.001

A. Muthoo, A Bargaining Model Based on the Commitment Tactic, Journal of Economic Theory, vol.69, issue.1, pp.134-152, 1996.
DOI : 10.1006/jeth.1996.0041

T. W. Lauer and X. Deng, Building online trust through privacy practices, International Journal of Information Security, vol.42, issue.1, pp.323-331, 2007.
DOI : 10.5465/AMR.1996.27003216

L. Fritsch, A. Groven, and T. Schulz, On the Internet of Things, Trust is Relative, Constructing Ambient Intelligence, pp.267-273, 2012.
DOI : 10.1007/978-3-642-31479-7_46

C. Flavián and M. Guinalíu, Consumer trust, perceived security and privacy policy, Industrial Management & Data Systems, vol.106, issue.5, pp.601-620, 2006.
DOI : 10.1108/07363769910260515

L. Coles-kemp and E. Kani-zabihi, On-line privacy and consent, Proceedings of the 2010 workshop on New security paradigms, NSPW '10, 2010.
DOI : 10.1145/1900546.1900560

J. R. Ferrari and J. F. Dovidio, Examining Behavioral Processes in Indecision: Decisional Procrastination and Decision-Making Style, Journal of Research in Personality, vol.34, issue.1, pp.127-137, 2000.
DOI : 10.1006/jrpe.1999.2247

C. Jensen and C. Potts, Privacy policies as decision-making tools, Proceedings of the 2004 conference on Human factors in computing systems , CHI '04, 2004.
DOI : 10.1145/985692.985752

B. S. Ivens and C. Pardo, Are key account relationships different? Empirical results on supplier strategies and customer reactions, Industrial Marketing Management, vol.36, issue.4, pp.470-482, 2007.
DOI : 10.1016/j.indmarman.2005.12.007

A. Sunyaev, T. Dehling, P. L. Taylor, and K. D. , Availability and quality of mobile health app privacy policies, Journal of the American Medical Informatics Association, vol.22, pp.1-4, 2014.
DOI : 10.1136/amiajnl-2013-002605

URL : https://academic.oup.com/jamia/article-pdf/22/e1/e28/5173337/amiajnl-2013-002605.pdf

J. B. Earp, A. I. Antón, L. Aiman-smith, and W. H. Stufflebeam, Examining Internet Privacy Policies Within the Context of User Privacy Values, IEEE Transactions on Engineering Management, vol.52, issue.2, pp.227-237, 2005.
DOI : 10.1109/TEM.2005.844927